binary-re

v1.0.0

Agentic binary reverse engineering for ELF binaries on ARM64, ARMv7, x86_64 - hypothesis-driven analysis with radare2, Ghidra, GDB, QEMU

reverse-engineeringbinaryelfarmembeddedfirmwareradare2r2ghidradisassemblydecompileqemugdb
Install Command /plugin install binary-re@2389-research
View Source
01

Documentation

Full plugin documentation and usage guide

Binary Reverse Engineering Plugin

Agentic workflow for reverse engineering ELF binaries from embedded devices using radare2, Ghidra, GDB, and QEMU.

Installation

/plugin install binary-re@2389-research

What This Plugin Provides

Skills

  • binary-re - Structured RE workflow with hypothesis-driven analysis

Capabilities

  • Cross-architecture static analysis (ARM64, ARMv7, x86_64, MIPS)
  • Dynamic tracing via QEMU user-mode emulation
  • GDB integration for fine-grained debugging
  • Ghidra headless decompilation
  • Human-in-the-loop for risky operations

Quick Example

User: "Analyze this binary from an IoT device - ARM, Linux-based"

Claude: [Triggers binary-re skill]

Let me start with triage to understand what we're working with.

Phase 1: Initial Triage

┌─────────────────────────────────────────┐

│ Architecture: ARM 32-bit LE (v7) │

│ Libc: musl 1.2.3 │

│ Dependencies: libcurl, libssl, libz │

│ Stripped: Yes │

│ Strings: 847 (including URLs, paths) │

└─────────────────────────────────────────┘

FACTS recorded:

  • Links against libcurl.so.4 (network client)
  • Contains string "api.vendor.com/telemetry"
  • Imports socket, connect, SSL_read functions

HYPOTHESIS: This is a telemetry client that phones home over HTTPS

Confidence: 0.7

Evidence: curl+ssl imports, telemetry URL string

Do you want me to proceed with static analysis of network-related

functions, or should we try dynamic analysis under QEMU first?

Tool Requirements

# Required

sudo apt install radare2 qemu-user gdb-multiarch

Recommended

Ghidra from https://ghidra-sre.org/

pip install frida-tools

ARM sysroots

sudo apt install libc6-armhf-cross libc6-arm64-cross

Use Cases

  • Firmware Analysis - Understand device behavior without source
  • Protocol Reverse Engineering - Map network communications
  • Security Research - Find vulnerabilities in embedded systems
  • Hardware Hacking - Analyze robot/IoT device internals

Philosophy

The LLM drives analysis; the human provides context.

You tell Claude:

  • What platform/device the binary came from
  • What hardware/chips are involved
  • What the binary is theorized to do
  • Any constraints (no network, isolated test env)

Claude executes:

  • Tool invocations with structured output
  • Hypothesis formation from evidence
  • Experiment design to test theories
  • Synthesis into actionable knowledge

Human-in-the-Loop

The skill asks for confirmation before:

  • Executing binaries (even sandboxed)
  • Network-capable dynamic analysis
  • Operations requiring device access
  • Major changes in analysis direction

Documentation

License

MIT

02

Quick Install

Get started in seconds

1
Add the marketplace (if not already added) /plugin marketplace add 2389-research/claude-plugins
2
Install this plugin /plugin install binary-re
3
You're good to go Skills auto-trigger when relevant
Back to Marketplace